Suppliers.

Add Supplier

Our supplier database tracks 3,772 solution providers in the global enterprise technology ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Download Excel
Filters
  • (45)
    • (45)
    • (17)
    • (16)
    • (14)
    • (14)
    • (13)
    • (13)
    • (8)
    • (7)
    • (3)
    • View all
  • (21)
    • (11)
    • (9)
    • (6)
    • (4)
    • View all
  • (20)
    • (12)
    • (10)
    • (8)
    • (5)
    • (5)
    • (3)
    • (3)
    • (3)
    • (3)
    • (2)
    • (2)
    • (2)
    • (1)
    • View all
  • (18)
    • (7)
    • (5)
    • (4)
    • (4)
    • (4)
    • (4)
    • (3)
    • (3)
    • (2)
    • (2)
    • (2)
    • (2)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • View all
  • (18)
    • (9)
    • (8)
    • (6)
    • (6)
    • (5)
    • (5)
    • (5)
    • (4)
    • (4)
    • (4)
    • View all
  • View all 14 Technologies
  • (21)
  • (19)
  • (15)
  • (14)
  • (13)
  • (12)
  • (11)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (8)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • View all 38 Industries
  • (12)
  • (11)
  • (10)
  • (8)
  • (8)
  • (7)
  • (7)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (1)
  • View all 13 Functional Areas
  • (14)
  • (9)
  • (7)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 108 Use Cases
  • (18)
  • (15)
  • (11)
  • (11)
  • (10)
  • (9)
  • (6)
  • (4)
  • View all 8 Services
  • (30)
  • (5)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 11 HQ Countries
  • (15)
  • (12)
  • (7)
  • (6)
  • (5)
  • View all 5 Revenue
Selected Filters
45 suppliers
Sort by:
ChinaNetCenter Logo
ChinaNetCenter
Founded in 2000 and among the first listed on the GEM in 2009, Wangsu Science and Technology Co., Ltd (Stock code: 300017) is a world leader in cloud distribution and edge computing conducting business in over 70 counties and regions. Wangsu strives to improve users’ digital experience, satisfying customers who require constant security, reliable data processing and interaction.
Compare
Download PDF
CyberX (Microsoft) Logo
CyberX (Microsoft)
CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.
Compare
Download PDF
Data Theorem Logo
Data Theorem
Data Theorem prevents AppSec data breaches. We provide SAST, DAST, & RASP for API Security, Web Security, Mobile Security, and Cloud Security.Our products provide Inventory (Discovery), Security Testing (SAST/DAST), and Active Protection (RASP) for APIs (RESTful, GraphQL, gRPC, and SOAP), mobile apps (iOS, Android, React Native, Flutter), Web Apps (Web 2.0 & Single Page Apps), & Cloud Apps + CSPM (Serverless Lambda, Google Cloud Functions, Azure Functions).Data Theorem is headquartered in Palo Alto, CA., with offices in New York, Chicago, Boston, Paris, and London.
Compare
Download PDF
DScifer Logo
DScifer
Dscifer specializes in Cyber Security, Digital Forensic & E-Discovery, Risk Management, Healthcare, Aerospace and Defense Systems solutions. Our diverse and talented employees are committed to help businesses, governments and educational institutions plan, build and run successful management programs through the right combination of products, services and solutions. Dscifer helps organization reduce risk, manage cyber security, plan digital forensic & e-discovery, achieve threat intelligence. Technology innovation is our commitment in healthcare, aerospace and defense systems.
Compare
Download PDF
Indegy (Tenable) Logo
Indegy (Tenable)
Indegy, a leader in industrial cyber security, protects operations (OT) networks from cyber threats, malicious insiders and human error.
Compare
Download PDF
Independent Security Evaluators Logo
Independent Security Evaluators
ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research. Using an adversary-centric perspective driven by our elite team of analysts and developers, we improve our clients’ overall security posture, protect digital assets, harden existing technologies, secure infrastructures, and work with development teams to ensure product security prior to deployment.
Compare
Download PDF
Levaux Logo
Levaux
Levaux’s SenseAgent is a fully integrated sensor to cloud solution with commercial acceptance in the commercial building market for lighting control, environmental monitoring, and real time location of people and assets.SenseAgent delivers in a single product a deployment ready, fully supported product at a price that is lower than the cheapest commercial lighting control systems available affording landlords, developers and tenants real savings with the benefits of control, utilisation and efficiency never before imagined.SenseAgent is truly ‘plug and play’ and can be fully deployed by an electrician in a fraction of the time required to install, commission, program and operate traditional lighting control platforms. With the commercial building market rapidly moving to a ‘connected building’ landscape Levaux’s capability is well positioned to deliver to the lighting control, environment and real time location markets whilst also providing ‘communications backhaul’ for management and operation of core building systems.
Compare
Download PDF
McAfee Logo
McAfee
McAfee is creating what’s next in online protection. As technologists, creatives, and people who thrive on looking forward, McAfee makes life online safe, so everyone can enjoy it with confidence - in all the ever-shifting forms it will take. Just as life online is full of possibility, life at McAfee is as well. You’ll have the freedom to explore challenges, take smart risks, and reach your potential in one of the fastest-growing industries in the world - backed by a team that supports and inspires you. ​
Compare
Download PDF
NanoLock Security Logo
NanoLock Security
NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance.NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks.Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines.NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”.NanoLock is headquartered in Israel with offices in the US, Europe, and Japan.
Compare
Download PDF
PAS Logo
PAS
PAS provides process safety, cybersecurity, and asset reliability solutions for the energy, process, and power industries worldwide. Our ICS cybersecurity, Automation Asset Management, and Operations Management software and services support safe, secure, profitable, and compliant operations across the complex, heterogeneous, and proprietary process automation infrastructure. Why do leading global industrial companies choose PAS over their DCS vendors for their ICS cybersecurity and alarm management? Platform independence. Our independence from automation vendor platforms offers our clients the most seamlessly integrated and unified solution for managing the variety of systems at their sites. With more than 30 automation system brands and models within a typical enterprise, it is untenable to manage and protect the ICS layer from cyber threats and vulnerabilities. It is also expensive, inconsistent, and ineffective to manage the alarms within the different control systems with alarm management software offered by DCS vendors. With PAS alarm management solutions, industrial companies have the Assurance that their alarm systems perform optimally at the console level and deliver consistent KPIs at the management dashboard level.
Compare
Download PDF
Provectus Logo
Provectus
Provectus is an Artificial Intelligence consultancy and solutions provider, helping businesses achieve their objectives through AI.Provectus is an AWS Premier Consulting Partner with competencies in Data & Analytics, DevOps, and Machine Learning. The company designs and builds AI solutions for industry-specific use cases, Data and Machine Learning foundation, Cloud transformation, and DevOps adoption.
Compare
Download PDF
Sentinel IPS Logo
Sentinel IPS
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep Malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running.
Compare
Download PDF
Striim Logo
Striim
Striim is an end-to-end streaming data integration and operational intelligence platform. The platform specializes in data integration across a wide variety of sources including change data from enterprise databases, log files, message queues, and IoT sensor data. With that difficult piece solved, Striim makes it easy to correlate across streams, detect anomalies, identify and visualize events of interest, and trigger alerts and workflows, all within milliseconds.Year founded: 2012Revenue: $1 to 10 million (2015)
Compare
Download PDF
TransUnion Logo
TransUnion
TransUnion is a global information and insights company that makes trust possible between businesses and consumers, by ensuring that each consumer is reliably and safely represented in the marketplace.
Compare
Download PDF
Zapier Logo
Zapier
Zapier is on a mission to make automation work for everyone. With Zapier, you can integrate apps like Salesforce, Intuit, Google, and Dropbox, to move data between them automatically, so you can focus on your most important work.
Compare
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.